An Evaluation of Shared Multicast Trees with Multiple Active Cores

Size: px
Start display at page:

Download "An Evaluation of Shared Multicast Trees with Multiple Active Cores"

Transcription

1 Brigham Young University BYU ScholarsArchive All Faculty Publications An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala Aaron Fabbri Follow this and additional works at: Part of the Computer Sciences Commons Original Publication Citation Daniel Zappala and Aaron Fabbri, "An Evaluation of Shared Multicast Trees with Multiple Active Cores", IEEE International Conference on Networking, ICN'1, July 21. BYU ScholarsArchive Citation Zappala, Daniel and Fabbri, Aaron, "An Evaluation of Shared Multicast Trees with Multiple Active Cores" (2001). All Faculty Publications This Peer-Reviewed Article is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in All Faculty Publications by an authorized administrator of BYU ScholarsArchive. For more information, please contact

2 An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala and Aaron Fabbri Department of Computer Science, University of Oregon, Eugene, OR [zappala Abstract. Core-based multicast trees use less router state, but have significant drawbacks when compared to shortest-path trees, namely higher delay and poor fault tolerance. We evaluate the feasibility of using multiple independent cores within a shared multicast tree. We consider several basic designs and discuss how using multiple cores improves fault tolerance without sacrificing router state. We examine the performance of multiple-core trees with respect to single-core trees and find that adding cores significantly lowers delay without increasing cost. Moreover, it takes only a small number of cores, placed with a k-center approximation, for a multiple-core tree to have lower delay than a single-core tree with optimal core placement. We also find that traffic concentration is avoided as long as the load is spread among a set of cores. These results indicate that shared trees with multiple active cores are a viable alternative to shortest-path trees. 1 Introduction Multicast routing protocols are built using two basic types of trees: single-source shortest-path trees and shared core-based trees. In each case, a set of senders wants to deliver data to a set of members, known as the multicast group. With shortest-path trees, a separate tree is built for each source, using the least-cost paths between the source and the members. With a shared tree, one tree is built for the entire group and is shared among all the senders. Core-based trees are a simple way to build shared trees; a single router is chosen as the core, and a shortest-path tree is built from the core to the members. Senders transmit data toward the core until it reaches the tree. Shared trees have a significant advantage over single-source trees in that only only one routing table entry is needed for an entire group, instead of one per source. Hence, BGMP [1] uses shared trees for interdomain multicast to conserve state within the Internet backbone. Despite this advantage, core-based trees have a number of drawbacks relative to shortest-path trees. Foremost among these is that core-based trees on average impose a higher delay between a source and the group members [2]. This is because packets often must travel first to the core and then to the group members, This work was supported in part by the National Science Foundation under Grant ANI and NCR

3 and the core may not be along the shortest path to each member. In addition, the core is a single point of failure; although PIM [3] uses a list of backup cores [4], members may experience significant additional delay when a core fails. Finally, using core-based trees may cause traffic concentration, in which some links in the network are much more heavily utilized than others [2, 5]. Surprisingly, very little research has been conducted to study the possibility of using multiple cores to ameliorate these problems. The designers of both PIM and CBT [6] considered using multiple cores, but chose to use a single core early in the design stage. OCBT [7] uses a hierarchy of cores, in which cores at lower levels join to their parent in the higher level, forming a tree. OCBT s use of multiple cores helps to avoid looping problems that were present in initial designs of CBT. However, because each of the cores cooperate to form a single tree, this structure does not behave any differently than a single-core tree with respect to delay, fault tolerance, or traffic concentration. In this paper we demonstrate the promise of building shared multicast trees with multiple, independent cores. Each core is the center of a separate multicast tree, and there is no coordination or dependencies among cores. This design improves the fault tolerance of the shared trees and can significantly improve performance. Our results show that using multiple cores decreases the delay experienced by group members, since there is a greater possibility that each member will have a core near its shortest path. Furthermore, we achieve the surprising result that a small set of cores placed with a k-center approximation can produce a tree with lower delay than a single-core tree with optimal core placement. Finally, we show that multiple cores can spread the load of multicast traffic, eliminating the problem of traffic concentration. Based on these results, we conclude that shared trees using multiple cores are a significant improvement over single-core trees and thus a viable alternative to shortest-path trees. We begin by examining two alternatives for multiple-core trees and describe how these protocols can be implemented. Then we present the results of an extensive simulation study examining the performance of these designs with respect to delay, cost, and traffic concentration. 2 Multiple-Core Designs We consider two possible designs for multiple core trees and their implications for designing a multicast routing protocol. Both of these basic designs result in at most one copy of each packet being delivered to the group members. 2.1 Alternative Designs Our multiple-core designs share some basic functionality, namely each core is the root of its own bidirectional, shared multicast tree, spanning some or all of the group members. Senders that are not group members transmit packets toward the core until they reach a router that is part of the bidirectional tree. Using this as a foundation, we explore these two designs: 2

4 S S Core 1 Core 3 Core 1 Core 3 Core 2 Core 2 Fig. 1. Senders-To-All Fig. 2. Members-To-All 1. Senders-To-All. Each sender transmits data to all the cores; members join to only one of the cores. Fig. 1 illustrates how the Senders-To-All protocol works. In this example, there are three cores, each of which is the center of a separate, bidirectional tree connecting a subset of the group members. A sender, marked by S, is also a member and has joined to core 1. When it transmits a packet, it sends 3 copies, one toward each core, until they reach some router on the tree for that core. To receive packets, a member chooses a core and joins that core s shared tree. 2. Members-To-All. Each sender transmits data to just one of the cores; members join all of the cores. Fig. 2 illustrates how the Members-To-All protocol works. As with the previous example, there are three cores, but this time all members have joined to all the cores. In effect, this creates n redundant trees, and the sender chooses only one of them to transmit its data. In this example, sender S is also a member so it is joined to all of the trees. When it transmits a packet, it can send it on any one of the three trees, and can in fact choose a different tree for each packet. Likewise, different senders can utilize different cores. We are also investigating a third design, in which the senders and members both use only one core, and the cores distribute multicast packets among them. Distribution among cores could be done using a spanning tree, a ring, or some other structure. We do not consider this design in this paper. 2.2 Senders-To-All Advantages The Senders-To-All design has several significant advantages when compared to Members-To-All. First, Senders-To-All will on average use less router state, which we define as the number of routing entries per group at a given node. For both designs there is one tree per core, but for Members-To-All, each tree connects all of the members. Thus, for Members-To-All each router is likely to have one entry per core for each group, particularly as the group size grows. For Senders-To-All, on the other hand, each router is likely to have only one entry per group, especially if nearest attachment is used. 3

5 The Senders-To-All design also has the advantage of giving group members control over choosing a core. With Members-To-All, the source is responsible for choosing a core, then monitoring its status so that it can switch to a new core in case of failure. With Senders-To-All members have greater flexibility, since a given core may be good for some members and bad for others, depending on its location and the status of the network. With Senders-To-All, members can react quickly to failures and can even switch cores in order to improve performance characteristics such as loss and delay. It is also worth noting that, compared to a protocol such as PIM, both of our designs reduce the delay incurred when a core fails. Since the cores are already active (either receiving data or having members joined), the time required to switch cores after a failure is reduced. Moreover, both designs localize the recovery delay to only those senders or members who are using the failed core. 2.3 Using Multiple Cores In order to use multiple cores, group members (or their first-hop routers) need a mechanism to discover the identities of cores and select the one they will use. We refer to the first of these issues as core advertisement. For single-core protocols such as PIM, the current method for advertising cores [4] is to distribute a set of candidate cores throughout the network. When a source or group member needs to send to or join a group, it selects one of these candidate cores to act as the core for the group. All of the sources and group members deterministically select the same core because PIM uses a hash function based on the group identifier. Our multiple-core designs can use this same mechanism to distribute candidate cores and to choose a different set of active cores for each group. The PIM hash function produces a different ordering of cores for each group and PIM uses this ordering to select a backup core should the primary core fail. Similarly, a multiple-core protocol can use the hash function to select a set of n cores, along with backups for each of them. Once the set of cores is known, the group members must decide which core to utilize. For the Senders-To-All design, members must decide which core to receive packets from. Likewise, for the Members-To-All design, senders must decide which core to send packets to. In most cases, choosing the nearest core should give good performance. If a core becomes congested, however, then a member or sender may want to switch to a different core. Finally, the placement of the cores can impact the cost and delay of the multicast tree. We examine the effects of several core placement algorithms in the next section. 2.4 Implementation Details The primary issue that must be addressed to implement our multiple core designs is packet forwarding. The current multicast routing architecture allows for only 4

6 Source1 (Source1,Group) (Source1,Core1,(Source1,Group)) Member3 (Core1,Group,(Source1,Group)) Member2 Core1 (Source1,Group) Member1 Fig. 3. Using a Bidirectional Tree at a Core one shared tree per group. However, in our designs, there are several or many shared trees per group (one per core). These trees may overlap and thus must be identified and built individually. To facilitate our discussion we must first explain the current types of routing entries used for multicast. Currently, a multicast routing entry may be designated using either (S, G) or (, G) where S is the source address of a multicast packet and G is the group address. If a multicast packet matches a (S, G) entry, routers assume a shortest-path tree is being used; the packet must arrive on the incoming interface listed in the entry and is sent on all outgoing interfaces. Likewise, if a multicast packet matches a (, G) entry, routers assume a shared tree is being used and the packet is forwarded accordingly (either on a unidirectional or bidirectional shared tree). Multiple core trees, as described above, require a new type of multicast routing entry. We call this a (C, G) entry, where C is the IP address of the core. A router that receives a multicast packet matches it against (C, G) entries the same as it would for an (S, G) entry. However, if a match is found, then the packet is forwarded on a bidirectional tree; that is, it is sent on all interfaces listed except for the interface on which it arrived. In practical terms, this change may only require a few bits in the routing entry to specify how forwarding should be performed. Fig. 3 illustrates how packets are forwarded on a multiple-core tree using this new type of routing entry. When a source sends a packet to the group, its first-hop router encapsulates it and unicasts the packet toward its nearest core. When it reaches a router on the core s bidirectional tree, this router removes the original packet and then re-encapsulates it, this time using the core s address as the source address. This packet is multicast along the bidirectional tree until it reaches the leaf routers. These routers remove the original packet and deliver it to their local members. Note that this process requires packets to be encapsulated twice. If a sender is also a member, then only one encapsulation is needed because the unicasting step is eliminated. The steps for receiving packets depend on whether the Senders-To-All or Members-To-All design is being used. For Senders-To-All, a member s first hop 5

7 Average Maximum Delay Ratio (MCT-Sender-Nearest/SPT) Average Maximum Delay Ratio (MCT-Member-Nearest/SPT) Delay Ratio Delay Ratio Members Members Fig. 4. Delay for Random Core Selection and Nearest Attachment: Senders-To-All (left) and Members-To-All (right) router chooses one core and joins the bidirectional tree for that core. For Senders- To-All, the first-hop router joins the shared trees for all of the cores. These trees are joined in the usual manner, that is, by sending a separate join message toward the core for each tree. 3 Simulation Study We evaluate the feasibility of multiple-core trees by comparing their performance to single-core trees, as has been done in several previous studies comparing tree types [2] and core selection algorithms [5]. The factors in our experiment include group size (from 5 to 50), core selection (random and dominating set), and core attachment (random and nearest). The metrics we evaluate include cost, delay and traffic concentration. We report ratios to the corresponding SPT metrics, so that we can compare results across different graphs and groups. 3.1 Experiment Results: Delay For these experiments, we use a set of 10 flat, random graphs of 50 nodes each, using the Waxman model [8] within the GT-ITM topology generator [9]. All edges have unit weights and the average node degree is near 4. For each graph, we generate 50 random groups and measure the delay experienced by group members. We define delay as the number of links traversed between one sender and one member in the group. We calculate the maximum delay for each sender, then average these numbers to find the average-maximum for the group. We find that both Senders-To-All and Members-To-All can significantly reduce the delay experienced by group members when nearest attachment is used. As shown in Fig. 4, the delay decreases dramatically as the number of cores increases. This is because there is a greater chance that the member (or sender) will choose a core that is close to the shortest path. 6

8 Cost Ratio Cost Ratio (Cost MCT-Sender-Nearest / Cost SPT) Cost Ratio Cost Ratio (Cost MCT-Sender-Random / Cost SPT) Members Members Fig. 5. Cost for Senders-To-All with Random Core Selection: Nearest Attachment (left) and Random Attachment (right) Particularly interesting in these results is that, for nearest core attachment, most of the benefits are seen with only 5 cores, after which the graphs are mostly flat. Thus only a small number of nodes about 10% need to be used as cores for a group. Our results also show that the Members-To-All design is tolerant of members choosing distant cores: with random attachment delay increases only slightly as more cores are added. The Senders-To-All design, on the other hand, can suffer from large maximum delays when using random attachment. In the extreme case, with both a large group and a large number of cores, there is good chance that a member will choose to use some core that is distant from both itself and the sender. With the Senders-To-All design, the sender must transmit to all cores, so it will use the distant core and incur a large maximum delay. 3.2 Experiment Results: Cost To evaluate cost, we use the same experiment setup as for delay. We define cost as the number of links in a tree, representing the bandwidth consumed by one packet transmission. We calculate cost separately for each sender, then average these costs together to find the average cost for the whole group. Note that for Senders-To-All, we count each link for each packet sent; thus if three packets are sent to three different cores, it may be possible for one link to be counted three times. We find that the Members-To-All design performs better than Senders-To-All with respect to cost. Sending packets using Members-To-All does not consume much more bandwidth than a shortest-path tree. The cost ratio is nearly flat and close to 1 for both random and nearest attachment. In fact, the Members-To-All design actually performs slightly better than a single-core tree in this regard. This is because a sender is able to choose a core whose performance is very close to that of a shortest-path tree. 7

9 Delay Ratio with 30 Members Cost Ratio with 30 Members 2 MCT-KCenter-Sender MCT-KCenter-Member CBT-DelayOptimal MCT-Random-Sender MCT-Random-Member 2 MCT-Kcenter-Sender MCT-Kcenter-Member CBT-DelayOptimal MCT-Random-Sender MCT-Random-Member Delay (MCT/SPT) Cost (MCT/SPT) Fig. 6. K-Center Placement and Nearest Attachment: Delay Ratio (left) and Cost Ratio (right) Senders-To-All also performs well with regard to cost as long as nearest attachment is used (see Fig. 5). The only exception is that the cost increases for small groups with many cores, due to the number of copies generated on links close to the sender. Senders-To-All does not perform well with random attachment; as shown in Fig. 5 the cost ratio doubles as the number of cores increases. This happens because the sender generates a separate packet for each core and transmits each copy on a separate, but possibly overlapping tree. The copies will often travel some of the same links, multiplying the amount of bandwidth consumed by the sender. 3.3 Experiment Results: Core Selection To examine the effects of core selection, we used both a dominating set algorithm and a k-center algorithm. A dominating set is a subset of the nodes in the graph such that all nodes are within n hops of this set. A k-center algorithm fixes the number of cores to be equal to k, then tries to place them so as to minimize the distance from all nodes to the cores. Both finding a minimal dominating set and choosing an optimal placement of cores is NP-hard. We use approximation algorithms based on node degree, and our experiments indicate these are good approximations in random graphs. We find that both dominating set placement and k-center placement improve the delay and cost ratios for multiple-core trees. Delay is reduced by 10 to 20% for the different designs; the cost ratio is close to 1 already so the improvement is slight. Moreover, as the number of cores increases, multiple core trees using both random core selection and k-center placement can have lower delay than a single-core tree with optimal core placement! Fig. 6 shows these results. In this same figure we also show the cost ratio for the corresponding experiment. Again, K-center placement is an improvement over random core placement. The single-core tree with optimal core placement retains the lone advantage that it can have lower cost than a shortest-path tree. This is in keeping with the result from Calvert et al. [5] in which optimal core placement is the only placement 8

10 mechanism they study where single-core trees have lower cost than shortest-path trees. 3.4 Experiment Results: Traffic Concentration For traffic concentration, we followed the methodology used by Wei and Estrin.[2] For a given graph, we generate 300 groups and construct their multicast trees. Then, for each group, we transmit a single packet from each source. As each packet is sent, we count the number of times each link in the network is traversed. With multiple-core trees, it is possible that a given link is traversed more than once by a single packet, due to encapsulation. Our results show that as long as random core selection is used, both Members- To-All and Senders-To-All do not suffer from traffic concentration, regardless of the number of cores. This confirms the results of Calvert et al. [5] indicating that traffic concentration is only observed when a small number of cores is used across all groups. With random core selection, each group uses a different set of cores, so the traffic is spread throughout the network. We do observe traffic concentration when using k-center placement, because in this case all groups use the same set of cores. In this situation, the effects of traffic concentration appear when there are fewer than 4 cores. As the number of cores increases beyond this amount, traffic concentration disappears. 4 Conclusions and Future Work Our results indicate that multiple-core trees are a feasible alternative to shortestpath trees. They can have lower delay than trees using a single core and cost comparable to shortest-path trees. In addition, multiple-core trees do not suffer from traffic concentration, as long as a reasonably large set of candidate cores is used. An ISP may also use a k-center algorithm to choose a static set of cores; this can reduce delay and will avoid traffic concentration as long as a large enough set is used. We are particularly interested in the Senders-To-All variant since it uses less router state and provides group members with more flexible control when reacting to failed cores and congestion. In most situations, the delay and cost of the Senders-To-All design are close to that experienced with shortest-path trees, as long as nearest attachment is used. In this case, its primary drawback is its higher cost with small groups and large numbers of cores. We are exploring ways to reduce cost in this situation. Costs can increase when members choose distant cores, but a natural disincentive (higher delay) or policy rules will likely prevent this from happening. The Members-To-All variant has better performance in terms of cost and delay, and is also tolerant of group members choosing distant cores. It is less flexible with regard to fault tolerance and uses more router state, but we still consider it a viable option for multicast. 9

11 We are continuing to explore the design of multiple-core multicast protocols, particularly with respect to single-source multicast. We are also intrigued by the possibility of multiple core trees that use core distribution and are actively investigating the cost and delay attributes of these structures as well. Acknowledgments The authors would like to thank Virginia Lo for substantial contributions during the development of this work, as well as Krishnan Sivaramakrishna Iyer for help developing the dominating set approximation algorithm. References 1. S. Kumar, P. Radoslavov, D. Thaler, C. Alaettinoglu, D.Estring, and M. Handley, The MASC/BGMP Architecture for Inter-domain Multicast Routing, in ACM SIGCOMM, August Liming Wei and Deborah Estrin, The Trade-offs of Multicast Trees and Algorithms, in 1994 International Conference on Computer Communications Networks, September Stephen Deering, Deborah Estrin, Dino Farinacci, Van Jacobson, Ching-Gung Liu, and Liming Wei, An Architecture for Wide-Area Multicast Routing, in ACM SIGCOMM, August Deborah Estrin, Mark Handley, Ahmed Helmy, Polly Huang, and David Thaler, A Dynamic Bootstrap Mechanism for Rendezvous-based Multicast Routing, submitted to ACM/IEEE Transactions on Networking. 5. K.L. Calvert, E.W. Zegura, and M.J. Donahoo, Core Selection Methods for Multicast Routing, in International Conference on Computer Communications Networks, September A. J. Ballardie, P.F. Francis, and J. Crowcroft, Core Based Trees, in ACM SIGCOMM, August C. Shields and J.J. Garcia-Luna-Aceves, The Ordered Core Based Tree Protocol, in IEEE INFOCOM, Bernard M. Waxman, Routing of Multipoint Connections, IEEE Journal on Selected Areas in Communications, vol. 6, no. 9, December Ken Calvert and Ellen Zegura, Georgia Tech Internetwork Topology Models, 10

Using SSM Proxies to Provide Efficient Multiple- Source Multicast Delivery

Using SSM Proxies to Provide Efficient Multiple- Source Multicast Delivery Brigham Young University BYU ScholarsArchive All Faculty Publications 200--0 Using SSM Proxies to Provide Efficient Multiple- Source Multicast Delivery Daniel Zappala daniel_zappala@byu.edu Aaron Fabbri

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

Enhanced Cores Based Tree for Many-to-Many IP Multicasting

Enhanced Cores Based Tree for Many-to-Many IP Multicasting Enhanced Cores Based Tree for Many-to-Many IP Multicasting In this paper, we propose a simple and practical scheme for many-to-many IP multicasting. The proposed scheme is based on the core based tree

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E- mail: sj ko h @ pcc.c t ri.rc.k Abstract In this paper, we propose a simple

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

A New Path Probing Strategy for Inter-domain Multicast Routing

A New Path Probing Strategy for Inter-domain Multicast Routing A New Path Probing Strategy for Inter-domain Multicast Routing António Costa, Maria João Nicolau, Alexandre Santos and Vasco Freitas Departamento de Informática, Universidade do Minho, Campus de Gualtar,

More information

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003

Network Working Group Request for Comments: 3446 Category: Informational H. Kilmer D. Farinacci Procket Networks January 2003 Network Working Group Request for Comments: 3446 Category: Informational D. Kim Verio D. Meyer H. Kilmer D. Farinacci Procket Networks January 2003 Status of this Memo Anycast Rendevous Point (RP) mechanism

More information

How did IP Multicast get so complicated?

How did IP Multicast get so complicated? How did IP Multicast get so complicated? Mark Handley ACIRI mjh@aciri.org Overview IP Multicast Service Model Multicast Addresses DVMRP (1988-1993) Broadcast and Prune PIM-DM (~1993) DVMRP for "real" routers

More information

CORE BASED COMMUNICATION WITH QoS SUPPORT

CORE BASED COMMUNICATION WITH QoS SUPPORT CORE BASED COMMUNICATION WITH QoS SUPPORT ASHOK KUMAR BHOI, SATYA PRAKASH SAHOO, MANAS RANJAN KABAT M. Tech CSE, VSSUT BURLA Lecturer, Dept. of CSE,VSSUT BURLA Sr. Lecturer Dept. CSE VSSUT BURLA Email:

More information

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP Internet Draft Daniel Zappala Expires May 26, 1997 USC/ISI File: draft-ietf-rsvp-routing-01.ps November 1996 RSRR: A Routing Interface For RSVP Status of Memo November 26, 1996 This document is an Internet-Draft.

More information

Performance Evaluation of PIM-SM Recovery

Performance Evaluation of PIM-SM Recovery Performance Evaluation of PIM-SM Recovery Tarik Čičić1, Stein Gjessing 1, and Øivind Kure 1 University of Oslo, Department of Informatics P.B. Blindern, 3 Oslo, Norway {tarikc, steing}@ifi.uio.no Norwegian

More information

draft-ietf-idmr-pim-sm-guidelines-00.ps 2 Abstract This document provides guidelines and recommendations for the incremental deployment of Protocol In

draft-ietf-idmr-pim-sm-guidelines-00.ps 2 Abstract This document provides guidelines and recommendations for the incremental deployment of Protocol In 1 Protocol Independent Multicast-Sparse Mode (PIM-SM): Deployment Guidelines Deborah Estrin Ahmed Helmy David Thaler Liming Wei Computer Science Dept/ISI University of Southern Calif. Los Angeles, CA 90089

More information

GMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL

GMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL GMNF-DVMRP: AN ENHANCED VERSION OF DISTANCE VECTOR MULTICAST ROUTING PROTOCOL YUAN-CHENG LAI YING-DAR LIN AND WEI-CHE YU Department of Computer and Information Science, National Chiao Tung University,

More information

draft-ietf-pmbr-spec-01.ps 1 1 Assumptions This document species the behavior of PIM-SM Multicast Border Routers (PMBRs) that connect PIM- SM to DVMRP

draft-ietf-pmbr-spec-01.ps 1 1 Assumptions This document species the behavior of PIM-SM Multicast Border Routers (PMBRs) that connect PIM- SM to DVMRP PIM Multicast Border Router (PMBR) specication for connecting PIM-SM domains to a DVMRP Backbone Deborah Estrin Computer Science Department/ISI University of Southern California Los Angeles, CA 90089 estrin@usc.edu

More information

Configuring Bidirectional PIM

Configuring Bidirectional PIM Configuring Bidirectional PIM This chapter describes how to configure the Bidirectional PIM (bidir-pim) feature. Bidir-PIM is a variant of the Protocol Independent Multicast (PIM) suite of routing protocols

More information

Multicast Communications. Tarik Čičić, 4. March. 2016

Multicast Communications. Tarik Čičić, 4. March. 2016 Multicast Communications Tarik Čičić, 4. March. 06 Overview One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic concepts in multicast

More information

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF

List of groups known at each router. Router gets those using IGMP. And where they are in use Where members are located. Enhancement to OSPF Multicast OSPF OSPF Open Shortest Path First Link State Protocol Use Dijkstra s algorithm (SPF) Calculate shortest path from the router to every possible destination Areas Limit the information volume

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case Roberto Cocca, Stefano Salsano Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case INFOCOM Department Report 004-004-1999 University of Rome La Sapienza Abstract

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Broadcast and Multicast Routing

Broadcast and Multicast Routing Broadcast and Multicast Routing Daniel Zappala CS 460 Computer Networking Brigham Young University Group Communication 2/34 How can the Internet provide efficient group communication? send the same copy

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Core-Based GRASP for Delay-Constrained Group Communications

Core-Based GRASP for Delay-Constrained Group Communications Core-Based GRASP for Delay-Constrained Group Communications Zrinka Lukač Faculty of Economics and Business, University of Zagreb, Zagreb, Croatia zrinka.lukac@zg.t-com.hr Manuel Laguna Leeds School of

More information

Audio Streams Merging Over ALMI

Audio Streams Merging Over ALMI Audio Streams Merging Over ALMI Christopher J. Dunkle, Zhen Zhang, Sherlia Y. Shi, Zongming Fei Department of Computer Science University of Kentucky 301 Rose Street, 2 nd floor Lexington, KY 40506-0495,

More information

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001

IP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001 IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain

More information

Aggregated Multicast A Comparative Study UCLA CSD TR #

Aggregated Multicast A Comparative Study UCLA CSD TR # Aggregated Multicast A Comparative Study 1 UCLA CSD TR # 211 Jun-Hong Cui, Jinkyu Kim Dario Maggiorini, Khaled Boussetta and Mario Gerla Computer Science Department, University of California, Los Angeles,

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes: Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivation CS 268: IP Multicast Routing Ion Stoica April 8, 2003 Many applications requires one-to-many communication - E.g., video/audio conferencing, news dissemination, file updates, etc. Using unicast

More information

Alternate Path Routing for Multicast

Alternate Path Routing for Multicast Alternate Path Routing for Multicast Daniel Zappala Department of Computer and Information Science University of Oregon, Eugene zappala@cs.uoregon.edu Abstract Alternate path routing has been well-explored

More information

Aggregated Multicast A Comparative Study

Aggregated Multicast A Comparative Study Aggregated Multicast A Comparative Study Jun-Hong Cui, Jinkyu Kim Dario Maggiorini, Khaled Boussetta, and Mario Gerla Computer Science Department, University of California, Los Angeles, CA 90095 Abstract.

More information

Reducing the Size of Routing Tables for Large-scale Network Simulation

Reducing the Size of Routing Tables for Large-scale Network Simulation Reducing the Size of Routing Tables for Large-scale Network Simulation Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasumoto, Teruo Higashino and Kenichi Taniguchi Graduate School of Engineering Science,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion

To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion Brigham Young University BYU ScholarsArchive All Faculty Publications 27-5-1 To Repair or Not To Repair: Helping Ad Hoc Routing Protocols to Distinguish Mobility from Congestion Qiuyi Duan qiuyiduan@gmail.com

More information

Financial Services Design for High Availability

Financial Services Design for High Availability Financial Services Design for High Availability Version History Version Number Date Notes 1 March 28, 2003 This document was created. This document describes the best practice for building a multicast

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

ASM. Engineering Workshops

ASM. Engineering Workshops 1 ASM 2 ASM Allows SPTs and RPTs RP: Matches senders with receivers Provides network source discovery Typically uses RPT to bootstrap SPT RPs can be learned via: Static configuration recommended Anycast-RP

More information

IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment

IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment Finding Feature Information, page 1 Prerequisites for Optimizing PIM Sparse Mode in a Large IP Multicast Deployment,

More information

The Overlay Multicast Protocol (OMP): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks

The Overlay Multicast Protocol (OMP): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks The Overlay Multicast Protocol (): A Proposed Solution to Improving Scalability of Multicasting in MPLS Networks Hind O. Al-Misbahi King Abdulaziz University, Saudi Arabia ha.almis@gmail.com Abstract With

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Published Works Title Efficient Multi-Source Multicasting in Information Centric Networks Permalink https://escholarship.org/uc/item/7mx2w441 Author Garcia-Luna-Aceves,

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

An Overlay solution to IP-Multicast Address Collision Prevention

An Overlay solution to IP-Multicast Address Collision Prevention An Overlay solution to IP-Multicast Address Collision Prevention Piyush Harsh pharsh@cise.ufl.edu Computer and Information Science and Engineering University of Florida, Gainesville FL 32611 Abstract Multicast

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Multicasting in MPLS Domains

Multicasting in MPLS Domains Multicasting in MPLS Domains Baijian Yang Department of Computer Science and Engineering Michigan State University, East Lansing, MI Email: yangbaij@msu.edu Prasant Mohapatra Department of Computer Science

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Policy Aware QoS Inter-domain Multicast Routing

Policy Aware QoS Inter-domain Multicast Routing Policy Aware QoS Inter-domain Multicast outing António Costa, Maria João Nicolau, Alexandre Santos and Vasco Freitas Departamento de Informática, Universidade do Minho, Campus de Gualtar, 4710 raga, Portugal

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

A Protocol to Improve the State Scalability of Source Specific Multicast UCLA CSD TR #

A Protocol to Improve the State Scalability of Source Specific Multicast UCLA CSD TR # A Protocol to Improve the State Scalability of Source Specific Multicast UCLA CSD TR # 020016 Jun-Hong Cui, Dario Maggiorini, Jinkyu Kim, Khaled Boussetta, and Mario Gerla Computer Science Department,

More information

Table of Contents 1 PIM Configuration 1-1

Table of Contents 1 PIM Configuration 1-1 Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 19: Multicast Routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Framework for IP Multicast in Satellite ATM Networks

Framework for IP Multicast in Satellite ATM Networks 22nd AIAA International Communications Satellite Systems Conference & Exhibit 2004 9-12 May 2004, Monterey, California AIAA 2004-3176 Framework for IP Multicast in Satellite ATM Networks Ayan Roy-Chowdhury

More information

REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing

REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing Thomas T. Fuhrmann Praktische Informatik IV University of Mannheim 68131 Mannheim, Germany February 1, 2000 1 2 Protocol Independent

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

A Protocol to Improve the State Scalability of Source Specific Multicast

A Protocol to Improve the State Scalability of Source Specific Multicast A Protocol to Improve the State Scalability of Source Specific Multicast Jun-Hong Cui, Dario Maggiorini, Jinkyu Kim, Khaled Boussetta, and Mario Gerla Computer Science Department, University of California,

More information

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss

More information

(12) United States Patent (10) Patent No.: US 6,711,172 B1

(12) United States Patent (10) Patent No.: US 6,711,172 B1 USOO6711 172B1 (12) United States Patent (10) Patent No.: US 6,711,172 B1 Li (45) Date of Patent: Mar. 23, 2004 (54) NETWORK PACKET ROUTING 6,275,492 B1 * 8/2001 Zhang... 370/392 6,331,983 B1 * 12/2001

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

IP Multicast. What is multicast?

IP Multicast. What is multicast? IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a

More information

An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications

An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications An Efficient Routing Protocol with Group Management for Peer-to-Peer Multicast Applications Ning Wang & George Pavlou entre for ommunication Systems Research University of Surrey United Kingdom {N.Wang,

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

TOWARDS THE MODELLING OF THE FAULT TOLERANCE MECHANISM OF THE PIM-SM MULTICAST ROUTING PROTOCOL IN AN IPTV ENVIRONMENT

TOWARDS THE MODELLING OF THE FAULT TOLERANCE MECHANISM OF THE PIM-SM MULTICAST ROUTING PROTOCOL IN AN IPTV ENVIRONMENT TOWARDS THE MODELLING OF THE FAULT TOLERANCE MECHANISM OF THE PIM-SM MULTICAST ROUTING PROTOCOL IN AN IPTV ENVIRONMENT Gábor Lencse and István Derka Department of Telecommunications Széchenyi István University

More information

Integrated Services - Overview

Integrated Services - Overview Multicast QoS Need bandwidth/delay guarantees On many links unknown to sender Fortunately QoS development after multicast Takes multicast into account RSVP reservations from receivers toward sender rules

More information

Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast)

Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) 137 Distributed Conditional Multicast Access for IP TV in High-Speed Wireless Networks (Destination Specific Multicast) 1, 2 Jan Fesl, 1 Richard Klee, 1 Marie Dolezalova 1 Institute of Applied Informatics,

More information

PIM-SM Multicast Routing

PIM-SM Multicast Routing PIM-SM Multicast Routing Achmad Husni Thamrin SOI-ASIA OW 2004 Outline IP Multicast review Multicast forwarding review DVMRP and PIM-DM PIM-SM XORP 1 IP Multicast Review Many-to-many communication model

More information

SEM: A New Small Group Multicast Routing Protocol

SEM: A New Small Group Multicast Routing Protocol SEM: A New Small Group Multicast Routing Protocol Ali Boudani, Bernard Cousin IRISA/INRIA Rennes Campus Universitaire de Beaulieu, Avenue du Général Leclerc 35042 Rennes, France Tel: +33 2 9984 2537, Fax:

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Application-layer Multicast with Delaunay Triangulations

Application-layer Multicast with Delaunay Triangulations Application-layer Multicast with Delaunay Triangulations Jörg Liebeherr, Michael Nahas, Department of Computer Science, University of Virginia, Charlottesville, VA 9 Abstract Recently, application-layer

More information

The Future Leading Mobility Protocol: Mobile IPv4 OR Mobile IPv6?

The Future Leading Mobility Protocol: Mobile IPv4 OR Mobile IPv6? Kennesaw State University DigitalCommons@Kennesaw State University Faculty Publications 10-2006 The Future Leading Mobility Protocol: Mobile IPv4 OR Mobile IPv6? Victor A. Clincy Kennesaw State University,

More information

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6 Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6

More information

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998. Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount

More information

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Multicast routing Draft

Multicast routing Draft Multicast routing Draft Lucia Tudose Nokia Research Center E-mail: tudose@research.nokia.com Abstract Multicast routing is establishing a tree which is routed from the source node and contains all the

More information

Maximizable Routing Metrics

Maximizable Routing Metrics Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Multicast VPN C H A P T E R. Introduction to IP Multicast

Multicast VPN C H A P T E R. Introduction to IP Multicast C H A P T E R 7 Multicast VPN Multicast is a popular feature used mainly by IP-networks of Enterprise customers. Multicast allows the efficient distribution of information between a single multicast source

More information

Network Working Group Request for Comments: Category: Experimental. A. Helmy USC

Network Working Group Request for Comments: Category: Experimental. A. Helmy USC Network Working Group Request for Comments: 2362 Obsoletes: 2117 Category: Experimental D. Estrin USC D. Farinacci CISCO A. Helmy USC D. Thaler UMICH S. Deering XEROX M. Handley UCL V. Jacobson LBL C.

More information

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology CE443 Computer Networks Overlay Networks Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast benefits and applications 4 Multicast models

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth

Contents. Overview Multicast = Send to a group of hosts. Overview. Overview. Implementation Issues. Motivation: ISPs charge by bandwidth EECS Contents Motivation Overview Implementation Issues Ethernet Multicast IGMP Routing Approaches Reliability Application Layer Multicast Summary Motivation: ISPs charge by bandwidth Broadcast Center

More information

ETSF10 Internet Protocols Routing on the Internet

ETSF10 Internet Protocols Routing on the Internet ETSF10 Internet Protocols Routing on the Internet 2014, Part 2, Lecture 1.2 Jens Andersson Internet Hierarchy 2014-11-10 ETSF05/ETSF05/ETSF10 - Internet Protocols 2 Hierarchical Routing aggregate routers

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Multi-Instance MSDP 1-7 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

3. Create (*,G) entry: Multicast address = G RP-address = C outgoing interface list = {1} incoming interface = {2} WC-bit = 1 RPT-bit = 1

3. Create (*,G) entry: Multicast address = G RP-address = C outgoing interface list = {1} incoming interface = {2} WC-bit = 1 RPT-bit = 1 Protocol Independent Multicast{Sparse Mode (PIM-SM): Protocol Specication Deborah Estrin Dino Farinacci Ahmed Helmy David Thaler Computer Science Dept/ISI University of Southern Calif. Los Angeles, CA

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

End User Level Classification of Multicast Reachability Problems

End User Level Classification of Multicast Reachability Problems End User Level Classification of Multicast Reachability Problems Pavan Namburi and Kamil Sarac Department of Computer Science University of Texas at Dallas Richardson, Texas 75080 Email: pavan@student.utdallas.edu,

More information

Stephen Deering, Deborah Estrin, Dino Farinacci, Van Jacobson, Ching-gung Liu, Liming Wei. particular unicast routing protocol.

Stephen Deering, Deborah Estrin, Dino Farinacci, Van Jacobson, Ching-gung Liu, Liming Wei. particular unicast routing protocol. The PIM Architecture for Wide-Area Multicast Routing Stephen Deering, Deborah Estrin, Dino Farinacci, Van Jacobson, Ching-gung Liu, Liming Wei Abstract The purpose of multicast routing is to reduce the

More information

Implementing IPv6 Multicast

Implementing IPv6 Multicast Implementing IPv6 Multicast Last Updated: November 14, 2011 Traditional IP communication allows a host to send packets to a single host (unicast transmission) or to all hosts (broadcast transmission).

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL RESEARCH REPORT Framework for IP Multicast in Satellite ATM Networks by Ayan Roy-Chowdhury, John S. Baras CSHCN TR 2004-8 (ISR TR 2004-17) The Center for Satellite and Hybrid Communication Networks

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information